Date post: | 13-Apr-2018 |
Category: |
Documents |
Upload: | karthickdevan |
View: | 217 times |
Download: | 0 times |
of 21
7/26/2019 SA Documentation
1/21
Project Description
Our project entitled Seating arrangement system for collegeis to develop and setup
an application, which helps universities and college to reduce their human and manage the
examination seating arrangement for the students and also students can know their allotted room
at the time of examination. No of students allocated in a room, staff allocated for the exam
details and much more related information is maintained in an efficient manner in the database
and a user friendly graphical interface is created, so that the information about any room
allotment and staff allotment at the time of examination in colleges with their respective room
can be found in quick time and in less effort.
The overall project is designed and developed in regard to the need of the universities and
colleges where they can do seating arrangement for examination in computeried manner.
This project is meant for maintaining the examination details, student details who are all
attending the exams, !bsentees details, "taff allotment for respective room are available in the
database. "o we can retrieve the information from database to system at the time of examination.
7/26/2019 SA Documentation
2/21
Visual Basic 6:
#$"%!& '!"$( is a high level programming language which evolved from the earlier
)O" version called '!"$(. '!"$( means 'eginners* !ll+purpose "ymbolic $nstruction (ode. $t
is a very easy programming language to learn. The code looks a lot like nglish &anguage.
)ifferent software companies produced different versions of '!"$(, such as -icrosoft
'!"$(, %$(/'!"$(, 01'!"$(, $'- '!"$(! and so on. 2owever, people prefer to use
-icrosoft #isual 'asic today, as it is a well+developed programming language and supporting
resources are available everywhere.
Now, there are many versions of #' exist in the market, the most popular one and still
widely used by many #' programmers is none other than #isual 'asic 3. 1e also have #'.net,
#'4556, #'4557 and the latest #'4585. 'oth #b4557 and #'4585 are fully object orientedprogramming 9OO:; language.
#$"%!& '!"$( is a #$"%!& and events driven :rogramming &anguage. These are the
main divergence from the old '!"$(. $n '!"$(, programming is done in a text+only
environment and the program is executed sequentially. $n #', programming is done in a
graphical environment. $n the old '!"$(, you have to write program code for each graphical
object you wish to display it on screen, including its position and its color. 2owever, $n #' , you
just need to drag and drop any graphical object anywhere on the form, and you can change its
color any time using the properties windows.
On the other hand, because the user may click on certain object randomly, so each object
has to be programmed independently to be able to response to those actions 9events;. Therefore,
a #' :rogram is made up of many subprograms, each has its own program code, and each can
be executed independently and at the same time each can be linked together in one way or
another.
7/26/2019 SA Documentation
3/21
The Control Properties
'efore writing an event procedure for the control to response to a user*s input, you have
to set certain properties for the control to determine its appearance and how it will work with the
event procedure.
7/26/2019 SA Documentation
4/21
picture from the selected folder.
7/26/2019 SA Documentation
5/21
$f?.Then?.lesif in later lesson. #b@ed and vb'lue are color constants and 'ack(olor is the
background color property of the form.
The (ption Bo!
The Option 'ox control also lets the user selects one of the choices. 2owever, two or
more Option 'oxes must work together because as one of the Option 'oxes is selected, the other
Option 'oxes will be unselected. $n fact, only one Option 'ox can be selected at one time. 1hen
an option box is selected, its value is set to ATrueB and when it is unselectedC its value is set to
A=alseB. $n the following example, the shape control is placed in the form together with six
Option 'oxes. 1hen the user clicks on different option boxes, different shapes will appear. The
values of the shape control are 5, 8, and 4,D,E,6 which will make it appear as a rectangle, a
square, an oval shape, a rounded rectangle and a rounded square respectively.
The Dri)e "ist Bo!
The )rive &ist'ox is for displaying a list of drives available in your computer. 1hen you
place this control into the form and run the program, you will be able to select different drives
from your computer as shown in =igure D.D
The Directory "ist Bo!
The )irectory &ist 'ox is for displaying the list of directories or folders in a selected
drive. 1hen you place this control into the form and run the program, you will be able to select
different directories from a selected drive in your computer.
The *ile "ist Bo!
The =ile &ist 'ox is for displaying the list of files in a selected directory or folder. 1hen
you place this control into the form and run the program, you will be able to shown the list of
files in a selected directory as shown in =igure D.6
7/26/2019 SA Documentation
6/21
7/26/2019 SA Documentation
7/21
=or those users who donFt want to write programs, access provides macros. -acros let us
perform common tasks without user intervention. -acros let us manipulate data, open forms
and reports and automate any task that is repetitive or complex.
Conte!t1Sensiti)e Help an &ns0er /i2ar
&ike 1indows NT, !ccess provides online, context+sensitive help. !ccess also includes a
unique !nswer 1iards that answer questions written in simple nglish.
Built1in Security
"ince !ccess is a multi+user database, security features are built into the )'-". 1e can
enable database security at various levels. 1e can assign a password for loading !ccess so
that only authoried users can use it
Data#ase (#jects
!ccess stores all the data tables and other objects in a single database. These database objects
are queries, =orms, @eports and -acros.
3ueries
! query is used to extract information from a database. ! query can select a group of records
that fulfill a certain condition. -ost !ccess databases contain more than one table. 1e can
combine specific fields from multiple tables into one datasheet
*orms
=orms display and print data from a table or a query. =orms enable us view, edit and print
data in a custom format.
.
reports
7/26/2019 SA Documentation
8/21
@eports present our data in a printed format. 1e can create different types of reports with a
)'-". Our reports can combine multiple tables to present complex relationships among
different sets of data.
7/26/2019 SA Documentation
9/21
S4ST-+ ST.D4
5$ -7%ST%89 S4ST-+
The existing system is carried out manually. The existing system includes the data entries in
unclear package and most complicated packages. $t contains of policies that simply makes the
job more complicated and confusable storages in the system.
Demerits
The processing time is very high.
There is a chance for committing many mistakes.
@etrieval of information is very difficult.
rror detection and correction may take long time.
1astages of physical efforts.
5$5 P,(P(S-D S4ST-+
The new proposed system, which has been designed with -icrosoft #isual 'asic 3.5 as the
=ront+end, -icrosoft !ccess 455D as the 'ack+end and )ata report, is very effective in
eliminating the problems encountered with the existing manual system.
+erits
$t reduces tedious calculations.
-aintenance of the record is very easy.
asy to implement at real time scenarios.
The total processing time is less.
%ser+friendly environment is provided.
7/26/2019 SA Documentation
10/21
5$ *-&S%B%"%T4 ST.D4
! feasibility study is a preliminary study undertaken before the real work of a project starts to
ascertain the likelihood of the project*s success. $t is an analysis of possible solutions to a
problem and a recommendation on the best solution to use. $t involves evaluating how the
solution will fit into the corporation. $t, for example, can decide whether an order processing be
carried out by a new system more efficiently than the previous one.
! feasibility study is defined as an evaluation or analysis of the potential impact of a proposed
project or program. ! feasibility study is conducted to assist decision+makers in determining
whether or not to implement a particular project or program. The feasibility study is based on
extensive research on both the current practices and the proposed projectGprogram and its impact
on the selected organiation operation. The feasibility study will contain extensive data related tofinancial and operational impact and will include advantages and disadvantages of both the
current situation and the proposed plan.
The feasibility study is conducted to assist the decision+makers in making the decision that will
be in the best interest of the school food service operation. The extensive research, conducted in
a non+biased manner, will provide data upon which to base a decision.
! feasibility study could be used to test a new working system, which could be used becauseH
The current system may no longer suit its purpose,
Technological advancement may have rendered the current system redundant,
The business is expanding, allowing it to cope with extra work load,
(ustomers are complaining about the speed and quality of work the business provides,
(ompetitors are not winning a big enough market share due to an effective integration of
a computeried system.
!lthough few businesses would not benefit from a computeried system at all, the process of
carrying out this feasibility study makes the purchaserGclient think carefully about how it is going
to be used.
!fter request clarification, analyst proposes some solutions. !fter that for each solution it is
checked whether it is practical to implement that solution.
7/26/2019 SA Documentation
11/21
This is done through feasibility study. $n this various aspects like whether it is technically or
economically feasible or not. "o depending upon the aspect on which feasibility is being done it
can be categoried into four classesH
Technical Feasibility
Economic Feasibility
Operational Feasibility
Legal Feasibility
The outcome of the feasibility study should be very clear. $t should answer the following issues.
$s there an alternate way to do the job in a better wayI
1hat is recommendedI
Technical *easi#ility
$n technical feasibility the following issues are taken into consideration.
1hether the required technology is available or not
1hether the required resources are available
o -anpower+ programmers, testers J debuggers
o "oftware and hardware
Once the technical feasibility is established, it is important to consider the monetaryfactors also.
"ince it might happen that developing a particular system may be technically possible but it may
require huge investments and benefits may be less. =or evaluating this, economic feasibility of
the proposed system is carried out.
http://domains.googlesyndication.com/apps/domainpark/results.cgi?client=ca-afdo-pub-3366691112917527&url=http://freetutes.us/&hl=en&ac=r&q=monetary&afdt=pnCHggu8yLUKEwiv7IP30--YAhUCWnoKHYNK1TwQAxgBIAIwx6f2DjgeUMen9g5Qy7qLD1DVrK8PUNq3tRFQquj_E1DfoK8pUP3IidUBhttp://domains.googlesyndication.com/apps/domainpark/results.cgi?client=ca-afdo-pub-3366691112917527&url=http://freetutes.us/&hl=en&ac=r&q=monetary&afdt=pnCHggu8yLUKEwiv7IP30--YAhUCWnoKHYNK1TwQAxgBIAIwx6f2DjgeUMen9g5Qy7qLD1DVrK8PUNq3tRFQquj_E1DfoK8pUP3IidUB7/26/2019 SA Documentation
12/21
-conomic *easi#ility
=or any system if the expected benefits equal or exceed the expected costs, the system can be
judged to be economically feasible. $n economic feasibility, cost benefit analysis is done inwhich expected costs and benefits are evaluated. conomic analysis is used for evaluating the
effectiveness of the proposed system.
$n economic feasibility, the most important is cost+benefit analysis. !s the name suggests, it is an
analysis of the costs to be incurred in the system and benefits derivable out of the system. (lick
on the link below which will get you to the page that explains what cost benefit analysis is and
how you can perform a cost benefit analysis.
(perational *easi#ility
Operational feasibility is mainly concerned with issues like whether the system will be used if it
is developed and implemented. 1hether there will be resistance from users that will affect the
possible application benefitsI The essential questions that help in testing the operational
feasibility of a system are following.
)oes management support the projectI
!re the users not happy with current business practicesI 1ill it reduce the time
9operation; considerablyI $f yes, then they will welcome the change and the new system.
2ave the users been involved in the planning and development of the projectI arly
involvement reduces the probability of resistance towards the new system.
1ill the proposed system really benefit the organiationI )oes the overall responseincreaseI 1ill accessibility of information be lostI 1ill the system affect the customers
in considerable wayI
"egal *easi#ility
7/26/2019 SA Documentation
13/21
$t includes study concerning contracts, liability, violations, and legal other traps frequently
unknown to the technical staff.
7/26/2019 SA Documentation
14/21
$ S4ST-+ D-S%98
$ %8P.T D-S%98
Input Design is the process of converting user-originated data to a computer based
format. Errors are controlled in the input design screen.
The goal of designing the Input Design is to make data entry as easy as possible.
Timely messages are given for every transaction and samples are shown in table
views. So objectives of Input Design are
To produce cost effective method of $nput
To achieve good accuracy
To ensure input is acceptable and understood by the user.
$5 C(D- D-S%98
! code is an ordered collection of symbols designed to provide unique identification of data. The
main purpose of performing the code design is to simplify the coding and to achieve better
performance. The coding is prepared in such a way that the internal procedures are utilied
properly, validation messages are also displayed.
The variable has been chosen for processing of data is meaningful to the context in which it is
used. The coding of variables is done in such a way that anyone other than person who
developed then package can understand its purpose. Thus the maintainability we made easier.
The purpose of code is to facilitate the identification and retrieval of items of information
(oding is done with objects that very quickly processing of data, simple to understand and easy
to debug the errors. =urther development and modification in coding will do easily.
$5$ CH&,&CT-,%ST%CS (* 9((D C(D%89:
%niqueness
-eaningfulness
"tability
7/26/2019 SA Documentation
15/21
$ D&T&B&S- D-S%98
The first step in the development of a project is to design a robust database. 'efore you design a
database, itFs a good idea to recapitulate the concepts related to a database. ! database is a
repository of data, a place where you can store data and extract it whenever required.
7/26/2019 SA Documentation
16/21
The objective of the system is generation of reports for the queries posed. The output gives the
direct source of information to the user. The output design should be well formed so that it
contains all the required information and should be well formed to avoid any complexity in
getting information.
1ell+designed output increases the efficiency and it should provide clarity to the user. The
output from the system communicates the results of process to the user. ! brief description
should be given at end of each page. The output from the computer system communicates the
results of processing to the user
7/26/2019 SA Documentation
17/21
=$ S4ST-+ T-ST%89 &8D %+P"-+-8T&T%(8
=$ S4ST-+ T-ST%89
"ystem testing is actually a series of different tests whose primary purpose is to fully exercise the
computer+based system. !lthough each test has a different purpose, all work to verify that all
system elements have been properly integrated and perform allocated functions. $n the following
section, different system tests are discussed.
=$$ /hite Bo! Testing
1hite box testing focuses on the internal functioning of the product. =or this different
procedures are tested. 1hite box testing tests the following
&oops of the procedure
)ecision points
=$$5 Blac' Bo! Testing
'lack box testing tests the overall functional requirements of product. $nputs are supplied to
product and outputs are verified. $f the outputs obtained are same as the expected ones then the
product meets the functional requirements. $n this approach internal procedures are not
considered. $t is conducted at later stages of testing. Now we will look at black box testing
technique.
'lack box testing uncovers following types of errors.
$ncorrect or missing functions
$nterface errors
xternal database access
:erformance errors
7/26/2019 SA Documentation
18/21
$nitialiation and termination errors.
=$$ .nit Testing
1e know that smallest unit of software design is a module. %nit testing is performed to check the
functionality of these units. it is done before these modules are integrated together to build the
overall system. "ince the modules are small in sie, individual programmers can do unit testing
on their respective modules. "o unit testing is basically white box oriented. :rocedural design
descriptions are used and control paths are tested to uncover errors within individual modules.
%nit testing can be done for more than one module at a time.
The following are the tests that are performed during the unit testingH
Module interface test:here it is checked if the information is properly flowing into the
program unit and properly coming out of it.
Local data structures:these are tested to see if the local data within unit9module; is
stored properly by them.
Boundary conditions: $t is observed that much software often fails at boundary
conditions. That*s why boundary conditions are tested to ensure that the program is
properly working at its boundary conditions.
ndependent paths: !ll independent paths are tested to see that they are properly
executing their task and terminating at the end of the program.
Error handling paths:These are tested to check if errors are handled properly by them.
=$$= %ntegration Testing
%nit testing ensures that all modules have been tested and each of them works properly
individually. %nit testing does not guarantee if these modules will work fine if these are
integrated together as a whole system. $t is observed that many errors crop up when the modules
are joined together. $ntegration testing uncovers an error that arises when modules are integrated
to build the overall system.
7/26/2019 SA Documentation
19/21
$ntegration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unit tested
modules, integrate them, find errors, remove them and build the overall program structure as
specified by design.
=$$> ,eco)ery Testing
-any computer+based systems must recover from faults and resume operation within a pre+
specified time. $n some cases, a system may be fault tolerantC that is, processing faults must not
cause overall system function to cease. $n other cases, a system failure must be corrected within a
specified period or severe economic damage will occur.
@ecovery testing is a system test that forces the software to fail in a variety of ways and verifies
that recovery is properly performed. $t the recovery is automated 9performed by system itself;,
re+initialiation mechanisms, data recovery, and restart are each evaluated for correctness. $f the
recovery requires human intervention, the mean time to repair is evaluated to determine whether
it is within acceptable limits.
=$$6 Stress Testing
"tress tests are designed to confront program functions with abnormal situations. "tress testing
executes a system in a manner that demands resources in abnormal quantity, frequency, or
volume.
=$$? Security Testing
!ny computer+based system that manages sensitive information or causes actions that can harm
or benefit individuals is a target for improper or illegal penetration.
"ecurity testing attempts to verify that protection mechanism built into a system will protect it
from unauthoried penetration. )uring security testing, the tester plays the role of the individual
who desires to penetrate the system. The tester may attack the system with custom software
designed to break down any defenses that have been constructedC may overwhelm the system,
7/26/2019 SA Documentation
20/21
thereby denying service to othersC may purposely cause system errors, hoping to find the key to
system entryC and so on.
0iven enough time and resources, good security testing will ultimately penetrate a system. The
role of the system designer is to make penetration cost greater than the value of the information
that will be obtained in order to deter potential threats.
=$5 S4S4-+ %+P"-+-8T&T%(8
$mplementation is that stage of the project when the theoretical design is turned into working
system. !t this stage of the main workload, the greatest up heaved and the major impact on the
existing practices shifts to the under department. ! lot of planning has to go in for the successful
implementation o the system.
'eing in mind that implementation is a project in itself C care was taken to develop an effective
methodology for implementing the system. The major steps that are carried out in these stages
are summaried belowH
Training was given to the user of the system both theoretically as well practically.
They were briefed on the lines on the objectives of the system how to operate if and
the benefits that would reaped from the system. The system as test in the userFs environment and the user was prompted to give his
suggestions.
xisting data was converted into file structures compatible to the system.
The strategy user changeover of the system was parallel along with the automated
system to test the validity of the system.
=$ S4ST-+ +&%8T-8&8C-
$t is impossible to produce systems of any sie, which do not need to be changed. Over
the lifetime of a system, its original requirements will be modified to reflect changing
7/26/2019 SA Documentation
21/21
user and customer needs. The system*s environment will change as new hardware is
introduced. rror, undiscovered during system validation, may merge and require repair.
The process of changing of a system after it has been delivered and is in use is called "oftware
maintenance. The changes may involve simple changes to correct coding errors, more extensive
changes to correct design errors or significant enhancement to correct specification errors or
accommodate new requirements. -aintenance therefore, in this context, really means evolution.
$t is the process of changing a system to maintain its ability to survive.
There are three types of software maintenance with very blurred distinction between them.
=$5$ Correcti)e +aintenance
(orrective -aintenance is concerned with fixing reported errors in the software. (oding errors
are usually relatively cheap to correctC design errors are more expensive as they may involves the
rewriting of several programs components. @equirements errors are the most expensive to repair
because of the extensive system redesign with may be necessary.
=$5$5 &apti)e maintenance
!daptive maintenance means changing the software to new environment such as different
hardware platform or for use with a different operating systems. The software functionality does
not radically change.
=$5$ Perfecti)e maintenance
:erfective maintenance involves implementing new functional or non+functional system
requirements. These are generated by software customers as their organiations are business
changes.